Matproof × Microsoft Entra ID (Azure AD)
Microsoft Entra ID — users, conditional access, PIM, sign-in logs.
Matproof's Entra ID (formerly Azure AD) integration collects identity evidence including users and groups, conditional access policies and assignments, Privileged Identity Management (PIM) roles and activations, sign-in logs, MFA enrollment and enforcement, application registrations and consents.
Evidence Matproof collects from Microsoft Entra ID (Azure AD)
- Users, groups, directory roles
- Conditional access policies and assignments
- Privileged Identity Management (PIM) activations and approvals
- Sign-in logs and authentication methods
- MFA enrollment and enforcement
- Application registrations and consent grants
- Access review results
Frameworks supported
SOC 2ISO 27001NIS2DORAGDPR
Typical use cases
- SOC 2 CC6 logical access controls
- ISO 27001 A.5.15-18 identity management
- NIS2 Art. 21(2)(i) access management + MFA
- DORA Art. 9(4)(b) access rights and MFA
- Automated conditional-access effectiveness evidence
Setup
- 1Register a Matproof App in Entra ID (App Registration)
- 2Grant Directory.Read.All, Policy.Read.All, AuditLog.Read.All API permissions (admin consent)
- 3Copy Tenant ID, Client ID, Client Secret
- 4Paste into Matproof's Entra ID integration setup
Questions on the setup? Contact us — our team can pair with yours on the connection.
See Matproof × Microsoft Entra ID (Azure AD) in action.
30-minute demo — we connect a sandbox to show evidence flowing for your actual Microsoft Entra ID (Azure AD) setup.